UAC-0184 malware chain uses bitsadmin and HTA files to target Ukrainian military users


A newly analyzed UAC-0184 malware chain uses Windows shortcut files, bitsadmin, HTA scripts, PowerShell, and signed software components to deliver a layered payload against Ukraine-related targets.

The campaign appears focused on Ukrainian military-linked users and fits earlier reporting about UAC-0184 activity against representatives of the Ukrainian Defense Forces. The lure themes include reports, tables, scans, criminal proceedings, combat-related material, and personal contact requests.

The attack stands out because it avoids a simple one-step malware drop. Instead, it uses several legitimate Windows tools and signed binaries to make malicious behavior look like normal system or software activity.

How the UAC-0184 infection chain starts

The chain begins with a ZIP archive containing Windows shortcut files. These shortcuts are disguised as familiar office documents, including a PDF scan, a Word-style report, and an Excel-style table.

When a victim opens one of the shortcuts, it launches cmd.exe and runs a bitsadmin command. Bitsadmin then downloads an HTA file from remote infrastructure hosted at 169.40.135.35.

The downloaded HTA file is saved with a temporary-looking name and executed with mshta.exe. This lets the attackers use built-in Windows components instead of dropping an obvious executable at the first stage.

StageComponentPurpose
Initial lureZIP archive with LNK filesTricks the victim into opening a fake document
DownloaderbitsadminFetches the HTA payload from remote infrastructure
Script executionmshta.exeRuns the downloaded HTA file
Second stagePowerShellDownloads and extracts a ZIP payload archive
Payload stagingPlane9 and OpenVR filesLoads encoded components through DLL sideloading
Network coverVSLauncher.exe and PassMark EndpointRuns network-capable payload components under trusted-looking software

The payload delivery appears gated

The HTA delivery appears to use gating, which means the server may only serve the next payload to systems that match the attacker’s criteria. This can help the operators avoid sandboxes, automated scanners, and researchers.

Once the HTA runs, it starts a hidden PowerShell command. That command downloads a ZIP archive named dctrprraclus.zip and extracts it into an ApplicationData32 folder under the user’s AppData path.

An operation (Source – Synaptic Security)

The extracted files include Cluster-Overlay64.exe, openvr_api.dll, filter.bin, kernel-diag.lib, and a decoy file named Scan_001.pdf. The decoy PDF appears to distract the victim while the actual payload chain continues in the background.

Signed software gives the malware a cleaner cover

The attackers abuse legitimate software components to lower suspicion. Cluster-Overlay64.exe belongs to Plane9, a music visualizer, and acts as a host for the next DLL sideloading stage.

The malicious logic is not placed in the main executable. Instead, the chain hides loader behavior inside openvr_api.dll and encoded local blobs such as filter.bin and kernel-diag.lib.

The decoded payload later uses VSLauncher.exe, the Microsoft Visual Studio Version Selector, as a signed host process. That gives the activity a trusted-looking Microsoft process name while the attacker-controlled DLL runs underneath it.

  • Cluster-Overlay64.exe acts as a sideload host from a suspicious AppData path.
  • openvr_api.dll contains loader logic used in the staged chain.
  • filter.bin stores encoded payload data.
  • kernel-diag.lib contains another encoded loader component.
  • VSLauncher.exe provides a Microsoft-signed host process for the later stage.

PassMark components are repurposed for network activity

The final stage uses PassMark Endpoint components associated with BurnInTest, a legitimate commercial testing utility. In normal use, these components support network testing and peer discovery.

In this campaign, those same capabilities become useful cover for suspicious network behavior. The analyzed component listens for multicast discovery traffic on UDP 224.0.0.255 port 31339 and uses TCP port 31339 for peer data transfer.

The primary analysis treats the internal controller or C2 element as tentative. The important point for defenders is the reuse of signed third-party network functionality, not a hardcoded external C2 address inside the analyzed payload.

Why this attack is difficult to detect

The campaign chains together common Windows tools and legitimate signed binaries. That makes single-event detection harder because each individual tool can also appear in normal environments.

Bitsadmin can transfer files in the background. Mshta can run HTML application files. PowerShell can download and extract archives. VSLauncher.exe and PassMark components can look legitimate when viewed without context.

Plane9Engine.dll loads openvr_api.dll (Source – Synaptic Security)

The suspicious pattern comes from the sequence. A fake document shortcut launching bitsadmin, downloading an HTA from a bare IP address, running mshta, creating unusual AppData files, and then producing PassMark-like traffic on port 31339 should trigger immediate review.

SignalWhy it matters
bitsadmin followed by mshta.exeCommon living-off-the-land delivery pattern
HTA files with ~tmp namingMatches the temporary payload naming pattern
Files created in %APPDATA%\ApplicationData32Matches the campaign’s staging directory
Cluster-Overlay64.exe outside a normal install pathSuggests Plane9 component abuse
VSLauncher.exe outside expected Visual Studio behaviorMay indicate DLL sideloading
UDP traffic to 224.0.0.255:31339Matches repurposed PassMark discovery traffic

Indicators of compromise

Security teams can use the following indicators to hunt for related activity. Network indicators are defanged to prevent accidental access or linking.

TypeIndicatorDescription
IP address169[.]40[.]135[.]35Observed staging infrastructure for HTA files and payload archive
URLhxxp://169[.]40[.]135[.]35/dctrpr/slippersuppity.htaHTA payload URL used by one lure variant
URLhxxp://169[.]40[.]135[.]35/dctrpr/basketpast.htaHTA payload URL used by one lure variant
URLhxxp://169[.]40[.]135[.]35/dctrpr/agentdiesel.htaHTA payload URL used by one lure variant
URLhxxp://169[.]40[.]135[.]35/dctrprraclus.zipPayload ZIP archive
Network224[.]0[.]0[.]255:31339 UDPRepurposed PassMark multicast discovery traffic
Network31339/tcpRepurposed BurnInTest peer data channel
File pattern~tmp(…).htaTemporary HTA file pattern during initial execution

Files defenders should hunt for

The chain creates several distinctive file paths. Their presence does not always prove compromise by itself, but the combination of these files with bitsadmin, mshta, and port 31339 traffic should raise priority.

Security teams should focus on unusual AppData directories, DLL sideloading artifacts, and signed binaries running outside expected installation paths.

Endpoint teams should also inspect any process tree where a shortcut launches cmd.exe, cmd.exe launches bitsadmin, and mshta.exe runs soon after.

File or pathRole in the chain
%APPDATA%\ApplicationData32\Cluster-Overlay64.exePlane9-related sideload host
%APPDATA%\ApplicationData32\openvr_api.dllDLL loader component
%APPDATA%\ApplicationData32\filter.binEncoded payload blob
%APPDATA%\ApplicationData32\kernel-diag.libEncoded loader blob
%windir%\SysWOW64\input.dllPassMark Endpoint DLL used for sideloading
%windir%\SysWOW64\VSLauncher.exeMicrosoft-signed sideload host

SHA-256 indicators

The following hashes were reported in the analysis and can support endpoint hunting, malware triage, and retrospective searches.

SHA-256File
81d93004a02a455af01b0f709e34d5134108ec350f9391dc0f91a00a54998590dctrprraclus.zip
dc6cddc391b373b18f105f49a80ff83d53b430d8dea35c1f1576832fa9fbd2b3kernel-diag.lib
f5ca9c53d1537142889d7172c6643e886b2164233b91f0fc2d41ca010f035372filter.bin
df6942dc1a89226359adf1aac597c3b270f4a408214b4f7c2083f9524605e0f7openvr_api.dll
b811f28b844eff8c1f4f931639bed5bcc41113364fdfc44d7703259457839edbinput.dll
33e44dea247eaa8b0fc8ed1f8ed575905f6ce0b7119337ddd29863bbb03288b3PE_08 / SqlExpressChk.exe

What defenders should do now

Organizations with Ukraine-related exposure, defense-sector users, or staff who communicate through messaging apps should prioritize hunting for this activity.

The most useful detections combine process, file, and network telemetry. A single bitsadmin execution may be benign, but bitsadmin downloading HTA files from a bare IP address and immediately invoking mshta.exe is much more suspicious.

If related activity appears, isolate the host, collect volatile evidence, preserve the dropped files, and reset credentials associated with the affected user. Teams should also review connected accounts and messaging applications for follow-on compromise.

  • Block or monitor bitsadmin downloads from untrusted external hosts.
  • Restrict mshta.exe where business processes do not require HTA execution.
  • Alert on LNK files that launch cmd.exe with bitsadmin command lines.
  • Hunt for temporary HTA files using ~tmp naming patterns.
  • Monitor %APPDATA%\ApplicationData32 for unexpected executable or DLL creation.
  • Investigate VSLauncher.exe when it runs outside normal Visual Studio usage.
  • Monitor UDP 224.0.0.255:31339 and TCP 31339 traffic from hosts without PassMark tools.
  • Check for MiniDumpWriteDump calls from unexpected signed processes.

Why this campaign matters

UAC-0184’s latest chain shows how threat actors can blend malicious activity into trusted Windows behavior. The campaign does not rely on one exotic exploit. It relies on social engineering, native tools, layered staging, and signed software abuse.

That approach creates a serious detection challenge. Security tools must understand the full sequence rather than only flagging known malware files.

For defenders, the lesson is clear. Living-off-the-land activity, signed binaries, and legitimate network utilities need context. When they appear together in the wrong order, they can expose a carefully staged intrusion.

FAQ

What is the UAC-0184 bitsadmin and HTA malware chain?

It is a multi-stage malware chain linked to UAC-0184 that uses Windows shortcut files, bitsadmin, HTA files, mshta.exe, PowerShell, DLL sideloading, and signed software components to deliver and run payloads.

Who does UAC-0184 target?

Public reporting links UAC-0184 activity to Ukraine-related targets, including users connected to the Ukrainian Defense Forces. The group has used social engineering themes involving reports, criminal proceedings, combat videos, and personal contact requests.

Why are bitsadmin and mshta.exe important in this attack?

The attackers use bitsadmin to download HTA files and mshta.exe to execute them. Both are built-in Windows tools, which helps the activity blend into legitimate system behavior unless defenders monitor the full process chain.

What should defenders monitor for in this UAC-0184 campaign?

Defenders should monitor LNK files launching bitsadmin, HTA execution through mshta.exe, suspicious files in %APPDATA%\ApplicationData32, VSLauncher.exe outside normal Visual Studio paths, unexpected input.dll files, and UDP or TCP traffic on port 31339.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages